Information Security(QI-EB-022)

Job Details

Detection, containment, and analysis of security eventsInnovation of new and noteworthy detection methodsCreation and maintenance of various threat detection/prevention infrastructureCreate and/or support complex security policies to safeguard company and customer dataProvide timely response capabilities to any security threat or incident upon detectionEnhance threat detection and incident response program development through technology and process innovationExperience with digital investigations, being able to trace source and result of attack based on system, application, and/or network forensic evidence found, including via packet analysisBroad experience with various malware analysis techniques as well as innovation of malware detectionExtensive experience with data mining through multiple sources ranging from raw system/application/network logs to enterprise class databasesAdvanced knowledge of threat landscape and threat intelligence methodologiesRecent programming experience of some sort (Perl, Python, C, PowerShell, Ruby, SOAP, XML, etc)Ability to find common ground among differing points of view and lead group to an mutually acceptable solutionDemonstrated critical thinking capabilities, especially under pressureStrong communications skills, both written and oralMentor junior team members in skills, experiences, and career growthProven ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential mattersGift of being able to successfully convey extremely complicated technology topics to non-technology audienceExtreme passion for security incident response work and the complex process and technological infrastructure it requiresMinimum 7 - 10 years overall in information technology3 - 5 years of design and implementation of enterprise-class security infrastructure3 - 5 years of design and implementation of enterprise security programs, including policy, standards, and procedures3 -5 years of multi-phase technology project management experienceExtensive operational experience with multi-tier UNIX systems, IDS, firewall, databases, encryption, and log management/analysis infrastructureIn-depth analysis of incident forensic evidence on variety of platforms from large scale UNIX to mobile devices as well as networksBroad understanding of Internet infrastructure (TCP/IP, DNS, etc.). Degree: M.Com. (Commerce) | M.Pharm. (Pharmacy) | M.Sc. (Science) | MA (Arts) | MBA/ PGDM | MCA/ PGDCA